A new quantum authentication and key distribution protocol /

Key distribution is a fundamental problem in cryptography, in both symmetric and asymmetric ciphers. Symmetric ciphers usually resort to a courier-based method for key exchange, as do quantum key distribution systems. On the other hand, a schema for using hash functions as a medium for key exchange...

Full description

Saved in:
Bibliographic Details
Main Author: Abdul Majeed, Mohammed Munther
Format: Thesis
Language:English
Published: Kuala Lumpur : Kulliyyah of Engineering, International Islamic University Malaysia, 2012
Subjects:
Online Access:Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 033930000a22003370004500
008 121018t2012 my a m m 000 0 eng d
040 |a UIAM  |b eng 
041 |a eng 
050 0 0 |a TK5102.94 
100 1 |a Abdul Majeed, Mohammed Munther  
245 1 2 |a A new quantum authentication and key distribution protocol /  |c by Mohammed Munther Abdul Majeed 
260 |a Kuala Lumpur :  |b Kulliyyah of Engineering, International Islamic University Malaysia,   |c 2012 
300 |a xx, 208 leaves :  |b ill. ;  |c 30cm. 
500 |a Abstracts in English and Arabic. 
500 |a "A thesis submitted in fulfilment of the requirement for the Doctor of Philosophy in Electrical and Computer Engineering."--On t.p. 
502 |a Thesis (Ph.D.)--International Islamic University Malaysia, 2012. 
504 |a Includes bibliographical references (leaves 158-164). 
520 |a Key distribution is a fundamental problem in cryptography, in both symmetric and asymmetric ciphers. Symmetric ciphers usually resort to a courier-based method for key exchange, as do quantum key distribution systems. On the other hand, a schema for using hash functions as a medium for key exchange in both symmetric and asymmetric cipher was proposed by several investigators. However, if the schema is to be successful, the channel utilized should be substantially authenticated. Furthermore, and quite recently, the advancement in quantum-based communications has provided better means for authentication, which is utilized in this work. This thesis builds a novel key distribution protocol, based on cascaded hash functions, utilizing a communication channel that is authenticated based on the quantum-authentication by a deterministic six-state protocol (6DP). The basic idea is to divide this key distribution protocol into two processes; the control process where the 6DP is utilized to authenticate the channel, and the second process where cascaded hash functions, based on key distribution techniques, are used to construct the key at the sender and receiver sites. The hardware built for quantum authentication process is a field programmable gate array (FPGA) at the sender site, to control the setting of the quantum states through a random generator built into the FPGA. In addition, the FPGA is used to synchronize the laser timing pulses and opening/closing of the detectors gates to prevent eavesdroppers from compromising the security, hence authentication is established. 
596 |a 1 
650 0 0 |a Quantum communication  |x Security measures 
650 0 0 |a Quantum theory 
650 0 0 |a Cryptography 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Kulliyyah of Engineering  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Kulliyyah of Engineering 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/4726  |z Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. 
900 |a hab-ro-rose-naw 
999 |c 438628  |c 438628  |d 468898  |d 468898 
999 |c 438628  |c 438628  |d 468898  |d 468898 
952 |0 0  |6 T TK 005102.94 A1354N 2012  |7 0  |8 THESES  |9 758275  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t TK 5102.94 A1354N 2012  |p 00011270011  |r 2017-10-20  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF TK 5102.94 A1354N 2012  |7 0  |8 THESES  |9 849772  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf TK 5102.94 A1354N 2012  |p 00011270012  |r 2017-10-26  |t 1  |v 0.00  |y THESISDIG